“Is the Parkerian Hexad superior to the CIA Triad in describing the framework necessary for information systems security?” Yes, the Parkerian Hexad is superior to the CIA Triad because it is an updated approach that expands on the original three elements of the CIA Triad.

In order to answer this question let’s look at some definitions and history of information security. The U.S. Committee on National Security Systems (“CNSS”) defines "Information Systems Security” as the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability (CNSS, Instruction No. 4009). There are several different approaches that provide a guide on how best to accomplish information systems security. The two that I will compare are the CIA Triad and the Parkerian Hexad. In 1994, The National Security Telecommunications and Information Systems Security Committee created the Comprehensive Model for Information Systems Security or the CIA Triad (Whitman & Mattord, 2009). The CIA Triad stands for Confidentiality, Integrity, and Availability. Confidentiality is defined by the CNSS as “the property that information is not disclosed to system entities (users, processes, devices) unless they have been authorized to access the information” (CNSS, Instruction No. 4009). This is the need for only authorized people to have access to specific information and can also be the need to withhold specific information for an unauthorized person. An example of this is when a business, such as a credit card companies agrees not to share/sell your information to a third party. When I give my information to the credit card company I expect confidentiality and they; therefore, have a responsibility to provide it. The second part is Integrity. This is not the integrity of the person/entity holding one’s personal information. This is the integrity of the data...

YOU MAY ALSO FIND THESE DOCUMENTS HELPFUL

...The Central Inteligence Agency
The CIA is one of the U.S. foreign inteligency agencies, responsible for getting and analyzing information about foreign government, corporations, individuals, and reporting such information to the various branches of the U.S. government. The State Department's Bureau or intelligence
and reserch and theDefense Department'sdefense intelligence
agency comprise the other two. Its headquarters is inLangley, Virginia, across the Potomac River from...

...Information systems (IS) focuses on the system making use of technology and information technology (IT) focuses on technology and how it can help in disseminating information. Usually Information system are build using the information technology.
Information system referring to system designed to create, store, manipulate, communicate and disseminate information. Information systems typically include an IT component but are not purely concerned with IT, focusing in instead, on the end use...

...First thing I had to do was figure out what the AAA triad was, after a little researching on the internet I figured out it meant; Access control, Authentication, and Accounting.
Access control manages which individual or accounts may interact with certain resources and makes the decisions on which kind of operations these individuals or accounts can perform. Access control usually uses some type of identity which may be associated with a specific individual or account. After...

...times, the Triads are mostly associated with criminal activity, they originated as mutual support organizations for people at the bottom of the social hierarchy and to defend the common people from those of positions in power "to offer unacquainted people the kind of protection and mutual aid normally afforded by family members" (Murray 178). How they began has been agreed back and forth for many years and lots of theories have come up. However it is generally accepted that the...

...Reveal Topic: I will tell you some important factors about the Triads, I would explain what are they? Brief history about Chicago’s Chinatown, types of crimes committed, how we identify them, Research, Crime Theories related to Triads and lastly my critique about them.
Transition: Let’s start with what Triad is and a brief history about Chicago Chinatown.
* (MP1) A. According to T. Wing a British journal in Chicago - The Triads are...